D4Vinci / elpscrkLinks
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
☆891Updated last year
Alternatives and similar repositories for elpscrk
Users that are interested in elpscrk are comparing it to the libraries listed below
Sorting:
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,036Updated 3 weeks ago
- Hide your payload into .jpg file☆397Updated 3 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,162Updated last year
- Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily fin…☆747Updated last week
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,219Updated 4 months ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆521Updated last year
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,223Updated 3 years ago
- Image Payload Creating/Injecting tools☆1,264Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆755Updated 5 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,925Updated 2 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆378Updated 3 weeks ago
- [ Admin panel finder / Admin Login Page Finder ] ¢σ∂є∂ ву 👻 (❤-❤) 👻☆645Updated 9 months ago
- Xss Payload Generator ~ Xss Scanner ~ Xss Dork Finder☆604Updated 2 years ago
- Powerful framework for rogue access point attack.☆2,302Updated last year
- All In One Web Recon☆2,543Updated 6 months ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,230Updated 3 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆926Updated 5 months ago
- Tool Information Gathering Write By Python.☆740Updated 2 years ago
- Crack hashes in seconds.☆1,845Updated 10 months ago
- Password lists with top passwords to optimize bruteforce attacks☆387Updated last year
- Automated WPA/WPA2 PSK attack tool.☆590Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆825Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆504Updated 10 months ago
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,048Updated 6 years ago
- Websploit is a high level MITM framework☆1,215Updated 2 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,495Updated 2 years ago
- Search for leaked credentials☆1,362Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,733Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆617Updated last year
- Efficient and advanced man in the middle framework☆2,141Updated 2 years ago